The Challenges Of Multi-tenancy

The Challenges Of Multi-tenancy

The Challenges of Multi-tenancy

Regarded as one of the most important features of cloud computing, multi-tenancy is a key common attribute of both public and private spaces. It applies to all three layers of a cloud (IaaS, PaaS and SaaS) and refers to a software architecture design in which a single instance of a software application serves multiple customers.

Multi-tenancy architecture has many benefits over multi-instance architecture. It is often cheaper to run thanks to software development costs and maintenance costs being shared, updates are faster because the provider only has to make the changes once, and it is easily scalable. Nonetheless, challenges of running software for a large number of tenants still presents problems – what are they?

Security

librato

Software providers will naturally argue that their software is protected with the highest level of security available and that a company’s data is more secure than ever on their servers. Nonetheless, there is a scope for human error, where a database administrator accidentally grants access to an unauthorized person or contravenes the security policy of an organisation.

There is also the threat of hackers – no matter how secure an encryption is it can always to broken with the right knowledge. A hacker who breaks the encryption of multitenant database will be able to steal the data of hundreds of businesses who have data stored on it.

Capacity Optimization

Database administrators need the tools and the knowledge to understand which tenant should be deployed on which network in order to maximise capacity and reduce costs. This is process is further complicated by the need to continuously align capacity with business demand and requires providers to manage the actual and forecasted resource utilization for all their servers.

Service Delivery and High Availability

When failures occur or when certain services generate abnormal loads the service delivery can be interrupted – yet business clients will often request high-availability, typically 99.999 percent. Therefore, monitoring the service delivery and its availability is critical to ensure that the service is properly delivered and meeting SLAs. Without effective monitoring problems are hard to locate and downtimes are increased – often leading to lost revenue.

Monitoring

cto

According to Librato CTO and co-founder Joseph Ruscio, “modern IT environments are incredibly dynamic and their operators require sophisticated alerting capabilities”. He believes effective monitoring can be the solution for successfully managing the ever changing IT landscape and thus many of the challenges of multi-tenancy.

Ruscio’s company, the San Francisco-based Librato, offers clients a secure, stable and resistant platform that has been optimised for time series data analytics. It allows users to see all the metrics that are required to track the health of web-scale applications and consequently enables them to quickly find the cause of unexpected patterns and events. Their software accepts both a company’s operational metrics and its other additional metrics by using a REST API, and presents all the information in a web-based application that is highly-detailed and easy-to-use.

Indeed the company has recently launched a brand new alerting platform that they hope provide a framework for industry-leading new features. Amongst other features, users can now be alerted on application-level SLAs, on when a source stops reporting and on when all data-points in a given duration exceed a threshold.

Librato is rapidly becoming one of the ‘must-haves’ of multi-tenant architecture monitoring – a view echoed by Scott Turnquest, application developer at ThoughtWorks. He says, “Librato is one of the most important live dashboards that we have running in our team room. By watching out for particular trends, we’re usually able to be proactive about issues before they affect customers”.

Turnquest’s quote undoubtedly highlights the key reason for using an effective monitoring solution – addressing problems before they reach the customer. It means less downtime, reduced costs, improved client feedback, a better reputation in the market place, and improved business prospects long term. Ultimately, a high quality cloud monitoring tool such as Librato will aid administrators of multi-tenant architecture improve its security, capacity optimisation, service delivery, and high availability by helping them to configure problem detection and to do root-cause analysis. 

What do you think are the challenges of multi-tenant architecture? What about solutions? Do you use an effective monitoring tool? Let us know in the comments below.

By Daniel Price

Post Sponsored By Librato

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…